Anti-attack method for electronic components using RSA public key encryption algorithm

An encryption algorithm and electronic component technology, applied in the field of attack prevention, can solve the problems of leaking the secret parameters of the decryption algorithm and the insecurity of the encryption system, and achieve the effect of defending against DPA attacks.

Inactive Publication Date: 2013-04-24
KTMICRO ELECTRONICS
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attacks of the DPA type therefore make it possible to obtain additional information on the intermediate data processed by the microprocessor on the card during the execution of the encryption algorithm, which in some cases makes it possible to reveal the secret parameters of the decryption algorithm , making the encryption system insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method for electronic components using RSA public key encryption algorithm
  • Anti-attack method for electronic components using RSA public key encryption algorithm
  • Anti-attack method for electronic components using RSA public key encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0041] Such as figure 1 As shown, it is a schematic flow chart of the first embodiment of the anti-differential power analysis attack countermeasure method in the electronic component using the RSA public key encryption algorithm of the present invention. This method is adopted each time the RSA decryption algorithm using the CRT is executed, and the method will Ciphertext c, keys d, n, p, q are used as input, the method includes the following 8 steps:

[0042] Step 11, generate three random numbers: u, t, s;

[0043] Specifically, random numbers can be selected from pre-stored data;

[0044] Step 12, replace the ciphertext c with c'=c+u×n;

[0045] Step 13, calculate p'=p×t, q'=q×s;

[0046] Among them, p and q are two prime numbers with the same bit length but different sizes;

[0047] Step 14, calculate cp'=c'modp' and cq'=c'modq';

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-attack method for electronic components using a RSA public key encryption algorithm. The anti-attack method for the electronic components using the RSA public key encryption algorithm comprises: the method is adopted when a RSA decipherment algorithm using a Chinese remainder theorem is executed every time, and a ciphertext c, a secret key d, a secret key n, a secret key p and a secret key q are as input. The method comprises: three random numbers which are u, t and s are generated; c'=c+u*n replaces the ciphertext c; p'=p*t and q'=q*s; cp'=c' mod p' and cq'=c' mod; mp=cp'<dp'> mod p and mq=cq'<dq'> mod q'; m=mq+q*((mp-mq)(q-1 mod p)(mod p)); m mod n substitutes for m; and p and d are two different prime numbers with same bit length and respectively are euler functions of n, p' and q'. The anti-attack method for the electronic components using the RSA public key encryption algorithm may enable a DPA attacker not to get secret parameters of the decipherment algorithm effectively through extraneous information of intermediate data deposed by a microprocessor, so that the effect of defending DPA attack is achieved.

Description

technical field [0001] The invention relates to the field of attack prevention, in particular to an attack prevention method in electronic components using an RSA public key encryption algorithm. Background technique [0002] The cryptographic system is divided into a private key cryptosystem and a public key cryptosystem. The symmetric encryption algorithm DES developed by the National Bureau of Standards and IBM in 1977 and the public key proposed by R.Rivest, A.Shair and L.Adleman in 1978 are used respectively. The encryption algorithm RSA is represented. The private key cryptosystem is neither good for key management nor good for digital signature, but its speed is high. Public-key cryptography can be used for key management and digital signatures, but at a lower speed. The mechanism of the public key cryptosystem is to generate a pair of keys for each user: a public encryption key and a private decryption key, and the private encryption key (referred to as: public key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 刘忠志房伟如
Owner KTMICRO ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products